From: bill payne <billp@nmol.com>
To: jy@jya.com
Message Hash: 952d75953f34e9fe39a7fca5075e2125748a1b02875414a9af2b5c41505d9e87
Message ID: <359934DE.1B4@nmol.com>
Reply To: N/A
UTC Datetime: 1998-06-30 18:59:47 UTC
Raw Date: Tue, 30 Jun 1998 11:59:47 -0700 (PDT)
From: bill payne <billp@nmol.com>
Date: Tue, 30 Jun 1998 11:59:47 -0700 (PDT)
To: jy@jya.com
Subject: NSA and crypto algorithms
Message-ID: <359934DE.1B4@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain
It is EASY to make mistakes when designing crypto algorithms.
SECRECY works against NSA in that their work doesn't get
proper evaluation by HOSTILE referees. Like
http://www.jya.com/skipjack-bs2.htm
NSA does have good experiences at fielding crypto devices.
My suprise at gaining access to NSA crypto algorithms was how
simple they were.
Return to July 1998
Return to “bill payne <billp@nmol.com>”